Skip to content

Commit 2c5a522

Browse files
nodejs-github-botRafaelGSS
authored andcommittedAug 8, 2023
deps: upgrade openssl sources to quictls/openssl-3.0.10+quic1
PR-URL: #49036 Reviewed-By: Rafael Gonzaga <rafael.nunu@hotmail.com>
1 parent 6378377 commit 2c5a522

File tree

173 files changed

+2430
-1223
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

173 files changed

+2430
-1223
lines changed
 

‎deps/openssl/openssl/CHANGES.md

+68-5
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,70 @@ breaking changes, and mappings for the large list of deprecated functions.
2828

2929
[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod
3030

31-
### Changes between 3.0.9 and 3.0.9+quic [30 May 2023]
32-
* Add QUIC API support from BoringSSL
31+
### Changes between 3.0.10 and 3.0.10+quic [1 Aug 2023]
32+
33+
* Add QUIC API support from BoringSSL
34+
3335
*Todd Short*
36+
37+
### Changes between 3.0.9 and 3.0.10 [1 Aug 2023]
38+
39+
* Fix excessive time spent checking DH q parameter value.
40+
41+
The function DH_check() performs various checks on DH parameters. After
42+
fixing CVE-2023-3446 it was discovered that a large q parameter value can
43+
also trigger an overly long computation during some of these checks.
44+
A correct q value, if present, cannot be larger than the modulus p
45+
parameter, thus it is unnecessary to perform these checks if q is larger
46+
than p.
47+
48+
If DH_check() is called with such q parameter value,
49+
DH_CHECK_INVALID_Q_VALUE return flag is set and the computationally
50+
intensive checks are skipped.
51+
52+
([CVE-2023-3817])
53+
54+
*Tomáš Mráz*
55+
56+
* Fix DH_check() excessive time with over sized modulus.
57+
58+
The function DH_check() performs various checks on DH parameters. One of
59+
those checks confirms that the modulus ("p" parameter) is not too large.
60+
Trying to use a very large modulus is slow and OpenSSL will not normally use
61+
a modulus which is over 10,000 bits in length.
62+
63+
However the DH_check() function checks numerous aspects of the key or
64+
parameters that have been supplied. Some of those checks use the supplied
65+
modulus value even if it has already been found to be too large.
66+
67+
A new limit has been added to DH_check of 32,768 bits. Supplying a
68+
key/parameters with a modulus over this size will simply cause DH_check() to
69+
fail.
70+
71+
([CVE-2023-3446])
72+
73+
*Matt Caswell*
74+
75+
* Do not ignore empty associated data entries with AES-SIV.
76+
77+
The AES-SIV algorithm allows for authentication of multiple associated
78+
data entries along with the encryption. To authenticate empty data the
79+
application has to call `EVP_EncryptUpdate()` (or `EVP_CipherUpdate()`)
80+
with NULL pointer as the output buffer and 0 as the input buffer length.
81+
The AES-SIV implementation in OpenSSL just returns success for such call
82+
instead of performing the associated data authentication operation.
83+
The empty data thus will not be authenticated. ([CVE-2023-2975])
84+
85+
Thanks to Juerg Wullschleger (Google) for discovering the issue.
86+
87+
The fix changes the authentication tag value and the ciphertext for
88+
applications that use empty associated data entries with AES-SIV.
89+
To decrypt data encrypted with previous versions of OpenSSL the application
90+
has to skip calls to `EVP_DecryptUpdate()` for empty associated data
91+
entries.
92+
93+
*Tomáš Mráz*
94+
3495
### Changes between 3.0.8 and 3.0.9 [30 May 2023]
3596

3697
* Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic
@@ -45,7 +106,7 @@ breaking changes, and mappings for the large list of deprecated functions.
45106
IDENTIFIER to canonical numeric text form if the size of that OBJECT
46107
IDENTIFIER is 586 bytes or less, and fail otherwise.
47108

48-
The basis for this restriction is RFC 2578 (STD 58), section 3.5. OBJECT
109+
The basis for this restriction is [RFC 2578 (STD 58), section 3.5]. OBJECT
49110
IDENTIFIER values, which stipulates that OBJECT IDENTIFIERS may have at
50111
most 128 sub-identifiers, and that the maximum value that each sub-
51112
identifier may have is 2^32-1 (4294967295 decimal).
@@ -55,8 +116,6 @@ breaking changes, and mappings for the large list of deprecated functions.
55116
these restrictions may occupy is 32 * 128 / 7, which is approximately 586
56117
bytes.
57118

58-
Ref: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5
59-
60119
*Richard Levitte*
61120

62121
* Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which
@@ -19655,6 +19714,10 @@ ndif
1965519714

1965619715
<!-- Links -->
1965719716

19717+
[CVE-2023-3817]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3817
19718+
[CVE-2023-3446]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-3446
19719+
[CVE-2023-2975]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2975
19720+
[RFC 2578 (STD 58), section 3.5]: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5
1965819721
[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650
1965919722
[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255
1966019723
[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466

‎deps/openssl/openssl/Configure

+1-4
Original file line numberDiff line numberDiff line change
@@ -599,8 +599,7 @@ my @disable_cascades = (
599599

600600
"crypto-mdebug" => [ "crypto-mdebug-backtrace" ],
601601

602-
# If no modules, then no dynamic engines either
603-
"module" => [ "dynamic-engine" ],
602+
"module" => [ "dynamic-engine", "fips" ],
604603

605604
# Without shared libraries, dynamic engines aren't possible.
606605
# This is due to them having to link with libcrypto and register features
@@ -618,8 +617,6 @@ my @disable_cascades = (
618617
# or modules.
619618
"pic" => [ "shared", "module" ],
620619

621-
"module" => [ "fips", "dso" ],
622-
623620
"engine" => [ "dynamic-engine", grep(/eng$/, @disablables) ],
624621
"dynamic-engine" => [ "loadereng" ],
625622
"hw" => [ "padlockeng" ],

0 commit comments

Comments
 (0)
Please sign in to comment.